• Title/Summary/Keyword: Security Event

Search Result 398, Processing Time 0.028 seconds

A study on America Police-Private Security Partnership (미국 경찰과 민간경비의 Partnership에 관한 연구)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.15-22
    • /
    • 2012
  • A study on America Police-Private Security Partnership in Business Improvement Districts, Special Event Safety and Security, Community Policing, Alarms, Investigations, Electronic and Financial Crimes Investigations. Many Police-Private Security Partnerships have significantly changed how policing is done with respect to field operations, particularly patrol and access control. Some areas in which these collaborations have produced notable results are described here.

The Analysis of Event-based Jitter Buffer Algorithm (이벤트 방식 지터 버퍼 알고리즘의 분석)

  • Choi, Seung-Han;Park, Jong-Min;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.867-871
    • /
    • 2013
  • In this paper, a major factor in determining voice quality that corresponds to the jitter and jitter buffer algorithm for removing jitter will be described. We analyze various jitter buffer algorithms and suggest ways to improve performance of jitter buffer algorithm.

Technologies Of Educational Activity Development: Theoretical Fundamentals

  • Kravchuk, Nadiia;Kinakh, Nelia;Bortniuk, Tetiana;Fedosenko, Karina;Burlaka, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.177-180
    • /
    • 2021
  • The theoretical and methodological provisions that allow to systematically and comprehensively study the postgraduate pedagogical education of teachers; the essence and features of postgraduate pedagogical education of teachers of diverse training institutions, providing professional and pedagogical training of this category of pedagogical personnel, have been determined; regularities, principles and conditions for the implementation of promising directions of development of the system of postgraduate pedagogical education for teachers of diverse training have been developed; developed technological support for the development of postgraduate pedagogical education for teachers of multidisciplinary training; identified and substantiated promising directions for the development of postgraduate pedagogical education for teachers of multidisciplinary training in vocational education, due to the modernization.

Implementation of Audit Trail Service System for EDI Security (EDI 보안 감사 추적 서비스 시스템 구현)

  • Jeong, Gyeong-Ja;Kim, Gi-Jung;Seo, Gyeong-Ran;Ryu, Geun-Ho;Gang, Chang-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.754-766
    • /
    • 1997
  • In this paper,we implement the Audit Trail Service Sydtem for the EDI Security.It has solved a law dispute between enterprises by informations that have generated by the EDI serice systrm.The audit trail service sys-tem implemented for EDI security satisfied the requirements of audit and the protocol of the security serive of X.435 and X.400.The EDI Security Audit System consists of the event discrimiator,the audit recirder,the audit archiver,and the provider of audit services .The event discriminator classified the reansmitted data from the EDI network ot audit sercices.The audit recorder constructs an index that has combined time information wiht audit unformations which are classified by the event discriminator.ZThe audit archiver performas the vacumming of added audit imformations by passing time by passing time.The audit provider is a module that carries out the audit trail servies by using stored audit informations. The audit provider suports audit servies,which are non-requdiation,proof and probe,controller of security,and accesing infrimation.The audit trail service system for EDI security constructs audit information by using index that is combining time imfromation,so it supports especially fast accesing audit information.

  • PDF

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF

Interoperability Strategy Performance Evaluation of the Event Service of CORBA (CORBA 이벤트 서비스의 연동 방법 및 성능 평가)

  • Na, Gil-Seong;Lee, Sang-Ho
    • Journal of KIISE:Databases
    • /
    • v.27 no.1
    • /
    • pp.33-41
    • /
    • 2000
  • Since simple and convenient user interface, the Web is diffused widely. For integrating Web as a view of user interface and CORBA, CORBA object is made in applet, which is sent to Web browser in Client and executes by Web browser. To use CORBA Event Service in Web without violating a security constrains of applet, we need a interoperability of Event Service. This paper investigates interoperability of event channels of the event service of CORBA. We present three different methods that make one event channel. Pros and cons of each method are described. All mentioned approaches have been implemented in Java. An experimental performance evaluation has been carried out and evaluation results are also given.

  • PDF

웹서비스 전략

  • 정철용
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.331-334
    • /
    • 2002
  • Loosely coupled software components delivered over Internet standard technologies - SOAP over HTTP for transport - UDDI for registry and discovery - e-Business XML standards - Security and trust frameworks - Event notification(omitted)

  • PDF

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

Secure Multi-Party Computation of Technology FinTech (FinTech를 위한 다자간 컴퓨팅 암호기술)

  • Park, Chankil;Choi, Youngwha;Lee, Cheulhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.61-66
    • /
    • 2019
  • FinTech has expanded to the extent that not only businesses but almost everyone can feel the impact. The spread of the scope of use has introduced a variety of new financial services that are changing the way we live. In these environments, it is important to develop reliable security measures to protect against cyber attacks. The number of mobile financial transactions in the financial sector is also increasing, making security vulnerable. In this study, we studied security through mutual authentication method that can safely handle financial security and focused on FinTech's security processing through multi-party mutual authentication method that strongly prevents leakage of information even in the event of continuous and sophisticated attacks.

Broken Integrity Detection of Video Files in Video Event Data Recorders

  • Lee, Choongin;Lee, Jehyun;Pyo, Youngbin;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3943-3957
    • /
    • 2016
  • As digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.